CN111143586A - Picture processing method and related device - Google Patents

Picture processing method and related device Download PDF

Info

Publication number
CN111143586A
CN111143586A CN201911209308.6A CN201911209308A CN111143586A CN 111143586 A CN111143586 A CN 111143586A CN 201911209308 A CN201911209308 A CN 201911209308A CN 111143586 A CN111143586 A CN 111143586A
Authority
CN
China
Prior art keywords
electronic device
picture
picture data
application
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911209308.6A
Other languages
Chinese (zh)
Other versions
CN111143586B (en
Inventor
徐顺海
周涌
段晓冬
李俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN111143586A publication Critical patent/CN111143586A/en
Priority to PCT/CN2020/106822 priority Critical patent/WO2021027633A1/en
Application granted granted Critical
Publication of CN111143586B publication Critical patent/CN111143586B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/53Querying
    • G06F16/535Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a picture processing method, which relates to the field of information processing and comprises the following steps: the first electronic device receives a first input of a user for a first application. In response to the first input, the first electronic device obtains first picture data. When the first application does not have the authority to access the privacy information of the picture, the first electronic equipment deletes the privacy information in the first picture data. And the first electronic equipment sends the first picture data after the privacy information is deleted to second electronic equipment through the first application. Therefore, the method can dynamically delete the privacy information in the picture data when the picture data is sent through the application without changing the original picture data stored in the mobile phone, thereby protecting the privacy of the user.

Description

Picture processing method and related device
Technical Field
The present application relates to the field of information processing technologies, and in particular, to a picture processing method and a related apparatus.
Background
At present, information including shooting date, aperture, shutter, focal length, contrast, saturation, GPS positioning, thumbnail and the like, namely exchangeable picture file format (Exif) information, can be collected by smart phones and digital cameras in the shooting process. The Exif information is set specifically for a photograph of a digital camera, and can record attribute information and shot data of the data photograph. The Exif information may be attached to a file such as JPEG, TIFF, RIFF, or the like, to which parameter information related to the content of the digital camera shooting information and thumbnail images or image processing is added.
The current Exif information holds privacy information of a part of users, for example, GPS location information is carried when picture data is sent, and the like, so that an acquirer can deduce a private address of the user based on the GPS location information. For example, when a picture of the other party is obtained from a social channel, the obtaining person may inquire the GPS location information of the picture in the picture detail information. Then, the acquirer can view the shooting position of the picture on the map by the GPS position information. This causes personal privacy data of the photo holder to be revealed.
Disclosure of Invention
The application provides a picture processing method and a related device, which realize that electronic equipment can dynamically delete privacy information in picture data when reading/sending the read picture data through an application without permission without changing original picture data stored by a mobile phone, thereby protecting user privacy.
In a first aspect, the present application provides an image processing method, including: the first electronic device receives a first input of a user for a first application. In response to the first input, the first electronic device obtains first picture data. When the first application does not have the authority to access the privacy information of the picture, the first electronic equipment deletes the privacy information in the first picture data. And the first electronic equipment sends the first picture data after the privacy information is deleted to second electronic equipment through the first application.
By the picture processing method, the user can set the authority of the application program to access the private information in the Exif data on the electronic equipment, and when some application or receiver does not have the authority to access the Exif data of the picture, the electronic equipment can dynamically delete the private information (such as GPS (global positioning system) position information, picture shooting time, picture shooting machine type and the like) in the Exif data in the process that the application acquires picture original pictures or independently acquires the Exif data. Therefore, the electronic equipment can dynamically delete the privacy information in the Exif data when the picture data is read or the Exif data in the picture data is read without changing the picture data stored in the mobile phone, and the user privacy is protected.
In one possible implementation, before the first electronic device receives the first input of the user for the first application, the method further includes: the first electronic device receives a second input from the user. In response to the second input, the first electronic device turns on or off the permission of the first application to access the private information of the picture. Therefore, the user can set the obtaining authority of the privacy information in the picture for the application on the first electronic device, and the privacy of the user is protected for different applications.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: the first electronic equipment encrypts the privacy information in the first picture data. When the second electronic device does not have the authority to acquire the privacy information of the first picture data, the first electronic device sends the first picture data with the encrypted privacy information to the second electronic device through the first application. Therefore, when the first electronic device shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: the first electronic equipment encrypts the privacy information in the first picture data. When the second electronic device has the authority to acquire the privacy information of the first picture data, the first electronic device sends the first picture data and the key after the privacy information is encrypted to the second electronic device through the first application. The key is used for the second electronic device to decrypt the encrypted privacy information in the first picture data. Therefore, when the electronic device 100 shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: when the first electronic device determines that the avatar information corresponding to the account on the second electronic device is included in the first picture data, the first electronic device sends the first picture data to the second electronic device through the first application. When the first electronic device determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data, the first electronic device deletes the privacy information in the first picture data, and sends the first picture data with the privacy information deleted to the second electronic device through the first application. Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: when the first electronic device determines that the avatar information corresponding to the account on the second electronic device is contained in the first picture data, the first electronic device sends the first picture data and the secret key after the private information is encrypted to the second electronic device through the first application. And the secret key is used for the second electronic equipment to decrypt the private information. When the first electronic device determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data, the first picture data obtained by encrypting the privacy information by the first electronic device is sent to the second electronic device through the first application. Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected.
In a possible implementation manner, the deleting, by the first electronic device, the privacy information in the first picture data specifically includes: the first electronic device decodes the first picture data and stores the decoded first picture data into a designated cache. The first electronic equipment deletes the privacy information in the first picture data in the designated cache. Therefore, the privacy information in the Exif data can be deleted dynamically when the picture data or the Exif data in the picture data is read without changing the picture data stored in the mobile phone.
In a possible implementation manner, the deleting, by the first electronic device, the privacy information in the first picture data specifically includes: the first electronic device decodes the first picture data and deletes the privacy information in the first picture data. And the first electronic equipment stores the first picture data after the privacy information is deleted into a specified cache. Therefore, the privacy information in the Exif data can be deleted dynamically when the picture data or the Exif data in the picture data is read without changing the picture data stored in the mobile phone.
In a possible implementation manner, the acquiring, by the first electronic device, the first picture data specifically includes: the first electronic equipment acquires a storage path of first picture data; the first electronic device acquires the first picture data according to the storage path of the first picture data.
In a possible implementation manner, after the first electronic device sends the first picture data after deleting the privacy information to a designated contact of the first application, the method further includes: the first electronic device obtains a thumbnail from exchangeable image file format Exif data of the first picture data. The first electronic device displays the thumbnail.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: the first electronic device sends the first picture data to the second electronic device through the first application.
In one possible implementation, the privacy information includes one or more of: shooting address information, shooting time information, shooting equipment model information, shooting mode information and portrait mood information.
In a second aspect, the present application provides a first electronic device, comprising: the input module is used for receiving first input of a user aiming at the first application. And the acquisition module is used for responding to the first input and acquiring first picture data. And the processing module is used for deleting the privacy information in the first picture data when the first application does not have the authority to access the privacy information of the picture. And the sending module is used for sending the first picture data after the privacy information is deleted to the second electronic equipment through the first application.
By the first electronic device, a user can set the authority of an application program for accessing the private information in the Exif data on the first electronic device, and when some application or receiver does not have the authority for accessing the Exif data on a picture, the first electronic device can dynamically delete the private information (such as GPS (global positioning system) position information, picture shooting time, picture shooting machine type and the like) in the Exif data in the process that the application acquires picture original pictures or independently acquires the Exif data. Therefore, the first electronic device can dynamically delete the privacy information in the Exif data when the picture data or the Exif data in the picture data are read without changing the picture data stored in the mobile phone, and the user privacy is protected.
In a possible implementation manner, the input module is further configured to receive a second input from the user. The first electronic device further includes: and the setting module is used for responding to the second input and opening or closing the permission of the first application for accessing the private information of the picture. Therefore, the user can set the obtaining authority of the privacy information in the picture for the application on the first electronic device, and the privacy of the user is protected for different applications.
In one possible implementation manner, the first electronic device further includes: and the encryption module is used for encrypting the privacy information in the first picture data when the first application has the authority to access the privacy information of the picture. The sending module is further configured to send the first picture data with the encrypted privacy information to the second electronic device through the first application when the second electronic device does not have the right to acquire the privacy information of the first picture data. Therefore, when the first electronic device shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation manner, the first electronic device further includes: and the encryption module is used for encrypting the privacy information in the first picture data when the first application has the authority to access the privacy information of the picture. The sending module is further configured to send the first picture data and the key after the privacy information is encrypted to the second electronic device through the first application when the second electronic device has the right to acquire the privacy information of the first picture data. The key is used for the second electronic device to decrypt the encrypted privacy information in the first picture data. Therefore, when the electronic device 100 shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
In a possible implementation manner, the processing module is further configured to determine whether avatar information corresponding to an account on the second electronic device is included in the first picture data. The sending module is further configured to send the first picture data to the second electronic device through the first application when the processing module determines that the avatar information corresponding to the account on the second electronic device is included in the first picture data. The sending module is further configured to send the first picture data with the privacy information deleted to the second electronic device through the first application when the processing module determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data. Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation manner, the first electronic device further includes: and the coding and decoding module is used for decoding the first picture data and storing the decoded first picture data into a specified cache. The processing module is specifically configured to delete the privacy information in the first picture data in the specified cache. Therefore, the privacy information in the Exif data can be deleted dynamically when the picture data or the Exif data in the picture data is read without changing the picture data stored in the mobile phone.
In one possible implementation manner, the first electronic device further includes: and the coding and decoding module is used for decoding the first picture data. The processing module is specifically configured to delete the privacy information in the first picture data, and store the first picture data from which the privacy information is deleted in a specified cache. Therefore, the privacy information in the Exif data can be deleted dynamically when the picture data or the Exif data in the picture data is read without changing the picture data stored in the mobile phone.
In a possible implementation manner, the obtaining module is specifically configured to: responding to the first input, and acquiring a storage path of first picture data; and acquiring the first picture data according to the storage path of the first picture data.
In a possible implementation manner, the obtaining module is further configured to obtain a thumbnail from the exchangeable file format Exif data of the first picture data after the sending module sends the first picture data with the privacy information deleted to the second electronic device. The first electronic device further includes: and the display module is used for displaying the thumbnail after the sending module sends the first picture data with the privacy information deleted to the second electronic equipment.
In a possible implementation manner, the sending module is further configured to send the first picture data to the second electronic device when the first application has permission to access the private information of the picture.
In one possible implementation, the privacy information includes one or more of: shooting address information, shooting time information, shooting equipment model information, shooting mode information and portrait mood information.
In a third aspect, the present application provides a first electronic device comprising one or more processors, one or more memories, and a touch screen. The one or more memories are coupled to the one or more processors and the one or more memories are configured to store computer program code comprising computer instructions that, when executed by the one or more processors, cause the communication device to perform the method of picture processing information in any of the possible implementations of any of the aspects.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, which includes computer instructions, and when the computer instructions are executed on an electronic device, the communication apparatus is caused to execute the picture processing information method in any possible implementation manner of any one of the foregoing aspects.
In a fifth aspect, an embodiment of the present application provides a computer program product, which when run on a computer, causes the computer to execute the method for processing information in any one of the possible implementation manners of the foregoing aspects.
Drawings
Fig. 1 is a schematic diagram of a picture file format according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating a process of reading an original picture by an application in the related art provided in the present application;
FIG. 3 is a schematic diagram of storing and reading exchangeable image file format data provided by an embodiment of the present application;
FIGS. 4A-4B are schematic diagrams of a set of interfaces provided by embodiments of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
FIG. 6 is a diagram illustrating a software architecture according to an embodiment of the present application;
FIGS. 7A-7G are schematic views of another set of interfaces provided by embodiments of the present application;
FIGS. 8A-8B are schematic views of another set of interfaces provided by embodiments of the present application;
FIGS. 9A-9G are schematic views of another set of interfaces provided by embodiments of the present application;
FIGS. 10A-10F are schematic views of another set of interfaces provided by embodiments of the present application;
FIGS. 11A-11E are schematic views of another set of interfaces provided by embodiments of the present application;
FIGS. 12A-12B are schematic views of another set of interfaces provided by embodiments of the present application;
fig. 13 is a schematic flowchart of a picture processing method according to an embodiment of the present application;
fig. 14 is a functional block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solution in the embodiments of the present application will be described in detail and removed with reference to the accompanying drawings. In the description of the embodiments herein, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" in the text is only an association relationship describing an associated object, and means that three relationships may exist, for example, a and/or B may mean: three cases of a alone, a and B both, and B alone exist, and in addition, "a plurality" means two or more than two in the description of the embodiments of the present application.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature, and in the description of embodiments of the application, unless stated otherwise, "plurality" means two or more.
The following describes the picture file format involved in the embodiments of the present application.
Referring to fig. 1, fig. 1 is a schematic diagram of a picture file format according to an embodiment of the present disclosure. As shown in fig. 1, the contents of the picture file all start at the start of image (SOI) flag and end at the end of image (EOI) flag. Wherein, the image start mark is a binary value of "0 xFDD 8", and the image end mark is "0 xFFDD 9". The picture file includes exchangeable image file format (Exif) data and main image data. Where the Exif data may start with the application 1(APP1) flag, the APP1 flag being a binary value "0 xFFE 1". The Exif data may include main image Exif information, thumbnail Exif information, and thumbnails. The main image Exif information is used to describe additional information of the main image data (e.g., information of photographing date, aperture, shutter, focal length, contrast, saturation, GPS position, etc.). The thumbnail Exif information is used to describe additional information of the thumbnail (e.g., the size of the thumbnail, the compression method of the thumbnail, etc.)
Wherein each parameter in the Exif data is tagged with a different tag. Analyzing the tag value in the Exif data, the storage location of each parameter in the Exif data can be determined. For example, the labels associated with GPS location information may be as shown in table 1 below:
TABLE 1
Figure BDA0002297712430000051
Figure BDA0002297712430000061
As can be seen from table 1 above, in the GPS location information, the tag value corresponding to the GPS version is "0", the tag value corresponding to the north-south latitude of the GPS is "1", the tag value corresponding to the GPS latitude is "2", the tag value corresponding to the east-west longitude of the GPS is "3", the tag value corresponding to the GPS longitude value is "4", the tag value corresponding to the GPS altitude reference value is "5", the tag value corresponding to the GPS altitude is "6", the tag value corresponding to the GPS timestamp is "7", the tag value corresponding to the satellite measured by the GPS is "8", the tag value corresponding to the GPS receiver state is "9", the tag value corresponding to the GPS measurement mode is "10", the tag value corresponding to the GPS precision is "11", the tag value corresponding to the GPS speed unit is "12", the tag value corresponding to the GPS receiver speed is "13", the tag value corresponding to the GPS mobile azimuth reference is "14", and the tag value corresponding to the GPS mobile azimuth is "15". The examples shown in table 1 above are merely illustrative of the present application and should not be construed as limiting.
The following describes a process of reading an original picture by an application program on an electronic device in the related art.
Referring to fig. 2, fig. 2 shows a flow of reading an original picture by an application in the related art of the present application. As shown in fig. 2, at present, the process of reading picture data by an application program on an electronic device such as a mobile phone or a tablet may be as follows:
s201, after receiving the task of loading and displaying the picture, the upper layer application (e.g., the wechat application) may create a picture reading request and issue the picture reading request to the picture obtaining module.
The picture reading request may include information such as a picture address, an operation type, and a conversion operation.
S202, after receiving the picture obtaining request, the picture obtaining module may determine whether the picture exists in the cache, and if the picture exists in the cache. The image acquisition module can read the data of the image from the cache and report the data to the upper application so as to display the image on the target interface layout.
S203, when the cache does not contain the data of the picture, the picture obtaining module may identify the loading path of the picture according to the picture address in the picture reading request.
Wherein each resource (e.g., picture, video clip, etc.) available to the electronic device can be represented by a Uniform Resource Identifier (URI). A URI may generally consist of three parts: the naming mechanism (scheme) for accessing the resource, the host name (hostname) for storing the resource, and the name (path) of the resource itself. The picture retrieval module may convert the URI of the picture into a storage path of the picture.
The picture acquisition module can judge the loading way of the picture according to the naming mechanism of the access resource in the URI of the picture. For example, when scheme is "content://" in the URI of the picture, the loaded picture is a picture stored locally on the electronic device. When scheme in the URI of the picture is http://, the loaded picture is a web picture.
Illustratively, the URI of all picture folders on the electronic device may be "content:// media/external", wherein the URI of picture A in all pictures may be "content:// media/external/images/media/212304". The picture obtaining module may convert the URI of the picture a into a storage path of the picture, where the storage path of the picture a may be "file: v/storage/organized/0/Android/data/com.zn _ android.zn/cache/PostPicture/201905193015. jpg ". The above examples are merely illustrative of the present application and should not be construed as limiting.
S204, the scheduling module can enqueue the picture acquisition tasks and execute the tasks according to the enqueue sequence.
The scheduling module can achieve enqueue, execution, completion, cancellation, suspension and the like of image acquisition. The scheduling module can realize the switching and execution of the service logic in different threads, and can also be responsible for managing thread pools, downloading, decoding, caching and the like.
S205, the scheduling module may determine whether the picture acquiring task is successfully executed, and if so, execute step S206, and the scheduling module may call the picture processing module to process the stored picture.
Because the picture information stored in the bottom layer is subject to the conversion of coding and decoding because of the problem of data format, the picture information can become a common picture file. The picture processing module can perform processing operations such as decoding, reversing, cropping and the like on the picture.
If the scheduling module determines that the enqueued picture acquisition task fails to be executed, the scheduling module may feed back the picture acquisition failure to the upper layer application, and end the picture acquisition process.
S207, the picture processing module may determine whether the picture processing is successful, if so, execute step S208, and the picture processing module may call the cache module to store the processed (for example, decoding, converting, and other processing operations) picture in the cache, and return a call interface of the picture in the cache to the upper layer application.
And S209, the upper layer application can acquire the picture from the cache according to the calling interface returned by the cache module.
After the picture is acquired, the upper layer application can display the picture on the target application layout of the display screen, and can upload the picture to a server or send the picture to equipment of a contact person.
In other related technologies, some applications on the electronic device may also separately obtain Exif data of the picture. For example, in order for a gallery application on an electronic device to classify pictures according to their shooting addresses, the gallery application may obtain GPS location information and thumbnails of the pictures from the Exif data of the pictures. After the gallery application acquires the GPS position information and the thumbnails of the pictures, the gallery application may classify the pictures according to the GPS position information of the pictures, and display the thumbnails corresponding to the pictures of which the GPS position information belongs to the same region in the same display area of the gallery application interface.
For another example, in order for the gallery application to classify the pictures according to their shooting times, the gallery application may also obtain the shooting times and thumbnails of the pictures from the Exif data of the pictures. After the gallery application obtains the shooting time and the thumbnails of the pictures, the gallery application can classify the pictures according to the shooting time of the pictures, and the thumbnails corresponding to the pictures with the shooting time belonging to the same time period are displayed in the same display area of the gallery application interface.
For example, as shown in fig. 3, when the camera application has an authority to acquire GPS location information of the electronic device, the camera application may acquire the GPS location information of the electronic device at the time of taking a picture and store the GPS location information in a picture file of the taken picture. Wherein the GPS location information may be stored in Exif data of the picture file. When the gallery application needs to obtain the GPS location information of the picture, the gallery application may obtain the GPS location information of the picture from the Exif data in the picture file.
If the gallery application needs to classify the pictures according to the GPS position information of the pictures, the gallery application can also acquire the thumbnails of the picture files from the pictures. After the thumbnail and the GPS location information of the picture file are acquired, the gallery application may determine an address name (e.g., shenzhen city) corresponding to the GPS location information from the map, and divide the picture file into categories corresponding to the address name. When the electronic device opens the category corresponding to the address name in the gallery application in response to an operation by the user, the electronic device may display the thumbnail of the picture file in the category corresponding to the address name.
Illustratively, as shown in FIG. 4A, the electronic device 100 displays a gallery interface 410. One or more folders may be included in the gallery interface 410, among other things. Wherein the one or more folders are distinguished by address name. For example, the address names of the one or more folders may include Guangzhou, Shenzhen, Wuhan, Shanghai, Beijing, Zhuhai, and so on. The address name of folder 411 can be "Shenzhen City". That is, the shooting addresses representing the pictures in the folder 411 are all in "Shenzhen City".
The electronic device may receive an input operation for the folder 411 by a user, and in response to the input operation, the electronic device may display a folder interface 420 as shown in fig. 4B. As shown in fig. 4B, the folder interface 420 displays thumbnails corresponding to one or more pictures with shooting addresses in "shenzhen city".
Through the related technology, some applications with the photo reading authority can directly send the photo original image data to the contact person or upload the photo original image data to the server. The photo original image data carries corresponding Exif data. The Exif data may include shooting location information (e.g., GPS positioning information), shooting time, shooting device model, shooting mode, portrait mood information, and the like. The information does not affect the imaging and display effect of the picture, but private data of the person is exposed. For example, when the electronic device sends artwork using WeChat, a real picture file is sent out together with Exif data, causing leakage of user privacy data.
Some applications can also read Exif data of the picture independently, and after the applications read the Exif data of the picture independently, the applications also have the risk of revealing privacy of the user.
Therefore, the application provides a picture processing method, a user can set the authority of an application program for accessing the private information in the Exif data on the electronic device, and when a certain application does not have the authority for accessing the Exif data of a picture, the electronic device can dynamically delete the private information (such as GPS (global positioning system) position information, picture shooting time, picture shooting machine type and the like) in the Exif data in the process that the application acquires picture original pictures or acquires the Exif data independently. Therefore, the electronic equipment can dynamically delete the privacy information in the Exif data when the picture data is read or the Exif data in the picture data is read without changing the picture data stored in the mobile phone, and the user privacy is protected.
An electronic device 100 provided in the present application is described below.
Fig. 5 shows a schematic structural diagram of the electronic device 100.
The following describes an embodiment specifically by taking the electronic device 100 as an example. It should be understood that the electronic device 100 shown in fig. 5 is merely an example, and that the electronic device 100 may have more or fewer components than shown in fig. 5, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The electronic device 100 may include: the mobile terminal includes a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identity Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processor (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
The controller may be, among other things, a neural center and a command center of the electronic device 100. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
The I2C interface is a bi-directional synchronous serial bus that includes a serial data line (SDA) and a Serial Clock Line (SCL). In some embodiments, processor 110 may include multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, the charger, the flash, the camera 193, etc. through different I2C bus interfaces, respectively. For example: the processor 110 may be coupled to the touch sensor 180K via an I2C interface, such that the processor 110 and the touch sensor 180K communicate via an I2C bus interface to implement the touch functionality of the electronic device 100.
The I2S interface may be used for audio communication. In some embodiments, processor 110 may include multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 may communicate audio signals to the wireless communication module 160 via the I2S interface, enabling answering of calls via a bluetooth headset.
The PCM interface may also be used for audio communication, sampling, quantizing and encoding analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled by a PCM bus interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to implement a function of answering a call through a bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus used for asynchronous communications. The bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit the audio signal to the wireless communication module 160 through a UART interface, so as to realize the function of playing music through a bluetooth headset.
MIPI interfaces may be used to connect processor 110 with peripheral devices such as display screen 194, camera 193, and the like. The MIPI interface includes a Camera Serial Interface (CSI), a display screen serial interface (DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the capture functionality of electronic device 100. The processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal and may also be configured as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, a MIPI interface, and the like.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transmit data between the electronic device 100 and a peripheral device. And the earphone can also be used for connecting an earphone and playing audio through the earphone. The interface may also be used to connect other electronic devices, such as AR devices and the like.
It should be understood that the connection relationship between the modules according to the embodiment of the present invention is only illustrative, and is not limited to the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The charging management module 140 is configured to receive charging input from a charger. The charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from a wired charger via the USB interface 130. In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle count, battery state of health (leakage, impedance), etc. In some other embodiments, the power management module 141 may also be disposed in the processor 110. In other embodiments, the power management module 141 and the charging management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the electronic device 100. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating a low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then passes the demodulated low frequency baseband signal to a baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs a sound signal through an audio device (not limited to the speaker 170A, the receiver 170B, etc.) or displays an image or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional modules, independent of the processor 110.
The wireless communication module 160 may provide a solution for wireless communication applied to the electronic device 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (bluetooth, BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
In some embodiments, antenna 1 of electronic device 100 is coupled to mobile communication module 150 and antenna 2 is coupled to wireless communication module 160 so that electronic device 100 can communicate with networks and other devices through wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division code division multiple access, TD-SCDMA), Long Term Evolution (LTE), LTE, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou satellite navigation system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The electronic device 100 implements display functions via the GPU, the display screen 194, and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may be a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), or the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, with N being a positive integer greater than 1.
The electronic device 100 may implement a shooting function through the ISP, the camera 193, the video codec, the GPU, the display 194, the application processor, and the like.
The ISP is used to process the data fed back by the camera 193. For example, when a photo is taken, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing and converting into an image visible to naked eyes. The ISP can also carry out algorithm optimization on the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing element converts the optical signal into an electrical signal, which is then passed to the ISP where it is converted into a digital image signal. And the ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into image signal in standard RGB, YUV and other formats. In some embodiments, the electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process digital image signals and other digital signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to perform fourier transform or the like on the frequency bin energy.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: moving Picture Experts Group (MPEG) 1, MPEG2, MPEG3, MPEG4, and the like.
The NPU is a neural-network (NN) computing processor that processes input information quickly by using a biological neural network structure, for example, by using a transfer mode between neurons of a human brain, and can also learn by itself continuously. Applications such as intelligent recognition of the electronic device 100 can be realized through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capability of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music, video, etc. are saved in an external memory card.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The processor 110 executes various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. The storage data area may store data (such as audio data, phone book, etc.) created during use of the electronic device 100, and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like.
The electronic device 100 may implement audio functions via the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or some functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also called a "horn", is used to convert the audio electrical signal into an acoustic signal. The electronic apparatus 100 can listen to music through the speaker 170A or listen to a handsfree call.
The receiver 170B, also called "earpiece", is used to convert the electrical audio signal into an acoustic signal. When the electronic apparatus 100 receives a call or voice information, it can receive voice by placing the receiver 170B close to the ear of the person.
The microphone 170C, also referred to as a "microphone," is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can input a voice signal to the microphone 170C by speaking the user's mouth near the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C to achieve a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 100 may further include three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, perform directional recording, and so on.
The headphone interface 170D is used to connect a wired headphone. The headset interface 170D may be the USB interface 130, or may be a 3.5mm open mobile electronic device platform (OMTP) standard interface, a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used for sensing a pressure signal, and converting the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A can be of a wide variety, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a sensor comprising at least two parallel plates having an electrically conductive material. When a force acts on the pressure sensor 180A, the capacitance between the electrodes changes. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the intensity of the touch operation according to the pressure sensor 180A. The electronic apparatus 100 may also calculate the touched position from the detection signal of the pressure sensor 180A. In some embodiments, the touch operations that are applied to the same touch position but different touch operation intensities may correspond to different operation instructions. For example: and when the touch operation with the touch operation intensity smaller than the first pressure threshold value acts on the short message application icon, executing an instruction for viewing the short message. And when the touch operation with the touch operation intensity larger than or equal to the first pressure threshold value acts on the short message application icon, executing an instruction of newly building the short message.
The gyro sensor 180B may be used to determine the motion attitude of the electronic device 100. In some embodiments, the angular velocity of electronic device 100 about three axes (i.e., the x, y, and z axes) may be determined by gyroscope sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects a shake angle of the electronic device 100, calculates a distance to be compensated for by the lens module according to the shake angle, and allows the lens to counteract the shake of the electronic device 100 through a reverse movement, thereby achieving anti-shake. The gyroscope sensor 180B may also be used for navigation, somatosensory gaming scenes.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude, aiding in positioning and navigation, from barometric pressure values measured by barometric pressure sensor 180C.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device 100 is a flip phone, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the opening and closing state of the leather sheath or the opening and closing state of the flip cover, the automatic unlocking of the flip cover is set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device 100 is stationary. The method can also be used for recognizing the posture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, taking a picture of a scene, electronic device 100 may utilize range sensor 180F to range for fast focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light to the outside through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100. When insufficient reflected light is detected, the electronic device 100 may determine that there are no objects near the electronic device 100. The electronic device 100 can utilize the proximity light sensor 180G to detect that the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to achieve the purpose of saving power. The proximity light sensor 180G may also be used in a holster mode, a pocket mode automatically unlocks and locks the screen.
The ambient light sensor 180L is used to sense the ambient light level. Electronic device 100 may adaptively adjust the brightness of display screen 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust the white balance when taking a picture. The ambient light sensor 180L may also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in a pocket to prevent accidental touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 can utilize the collected fingerprint characteristics to unlock the fingerprint, access the application lock, photograph the fingerprint, answer an incoming call with the fingerprint, and so on.
The temperature sensor 180J is used to detect temperature. In some embodiments, electronic device 100 implements a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 performs a reduction in performance of a processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection. In other embodiments, the electronic device 100 heats the battery 142 when the temperature is below another threshold to avoid the low temperature causing the electronic device 100 to shut down abnormally. In other embodiments, when the temperature is lower than a further threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown due to low temperature.
The touch sensor 180K is also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation applied thereto or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on a surface of the electronic device 100, different from the position of the display screen 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, the bone conduction sensor 180M may acquire a vibration signal of the human vocal part vibrating the bone mass. The bone conduction sensor 180M may also contact the human pulse to receive the blood pressure pulsation signal. In some embodiments, the bone conduction sensor 180M may also be disposed in a headset, integrated into a bone conduction headset. The audio module 170 may analyze a voice signal based on the vibration signal of the bone mass vibrated by the sound part acquired by the bone conduction sensor 180M, so as to implement a voice function. The application processor can analyze heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M, so as to realize the heart rate detection function.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys. The electronic apparatus 100 may receive a key input, and generate a key signal input related to user setting and function control of the electronic apparatus 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration cues, as well as for touch vibration feedback. For example, touch operations applied to different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also respond to different vibration feedback effects for touch operations applied to different areas of the display screen 194. Different application scenes (such as time reminding, receiving information, alarm clock, game and the like) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
Indicator 192 may be an indicator light that may be used to indicate a state of charge, a change in charge, or a message, missed call, notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card can be brought into and out of contact with the electronic apparatus 100 by being inserted into the SIM card interface 195 or being pulled out of the SIM card interface 195. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support a Nano SIM card, a Micro SIM card, a SIM card, etc. The same SIM card interface 195 can be inserted with multiple cards at the same time. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to implement functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, namely: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
The software system architecture referred to in this application is described below.
The software system of the electronic device 100 may employ a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the present invention uses an Android system with a layered architecture as an example to exemplarily illustrate a software structure of the electronic device 100.
Fig. 6 is a block diagram of the software configuration of the electronic apparatus 100 according to the embodiment of the present invention.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, from top to bottom, an application layer, an application framework layer, a system library, and a kernel layer (not shown).
The application layer may include a series of application packages. The application package may include applications such as a settings application 601, a social application 602 (e.g., WeChat, QQ, etc.), a gallery application 603, and so on.
The setting application 601 includes a filtering switch for privacy information, and is used to turn on/off a filtering function for picture privacy information. The settings application 601 may also modify the application's settings parameters.
Applications such as social application 602, gallery application 603, and the like may be used to obtain artwork data, Exif data, thumbnail data, and the like for picture files on an electronic device. Social application 602 may also send artwork data to the contacts' devices.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application programs of the application layer. The application framework layer includes a number of predefined functions.
As shown in fig. 6, the application framework layer may include an Exif data acquisition module 604, an Exif data optimization module 605, a thumbnail acquisition module 606, an artwork acquisition module 607, and the like.
The Exfi data obtaining module 604 may be configured to obtain Exif data in the picture file. The Exif data optimization module 605 may be used to provide an interface for a setup application to turn on or off private information filtering of pictures. The thumbnail obtaining module 606 may be configured to obtain a thumbnail from Exif data of a picture file. The original image obtaining module 607 is configured to obtain the decoded picture file.
In some embodiments, the application framework layer may also include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like (none shown in the figures). Wherein, the window manager is used for managing the window program. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like. The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc. The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures. The phone manager is used to provide communication functions of the electronic device 100. Such as management of call status (including on, off, etc.). The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like. The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like. The media library supports playback and recording of various commonly used audio and video formats, still image files, and the like. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like. The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like. The 2D graphics engine is a drawing engine for 2D drawing. The media library includes a picture coding and decoding library 608, and the picture coding and decoding library 608 can be used for coding and decoding pictures.
In the setting application 601, the user may set, to the social application 602, an authority to obtain the private information in the picture file. The setting application 601 may issue an application identifier corresponding to an application that does not have permission to acquire the private information in the picture file to the Exif data optimization module 605 of the framework layer. The Exif data optimization module 605 may control the filtering of private information in the picture file by the Exif data acquisition module 604, the thumbnail acquisition module 606, the artwork acquisition module 607, or the picture codec library 608.
1. When an application a (e.g., an application such as WeChat) needs to obtain original image data of a picture file, the Exif data optimization module 605 may determine whether the application a has permission to access private information in the picture file. If the application a does not have permission to access the private information in the picture file, the Exif data optimization module 605 may set one of the following private information filtering points.
Filtration point 1: the Exif data optimization module 605 may call the picture coding and decoding library 608 to code and decode the picture file to obtain the original image data, and filter out the privacy information in the original image data. The picture codec bank 608 may store the original picture data with the privacy information filtered out into a cache after the picture file is coded and decoded and the privacy information is filtered out. The artwork acquisition module 608 may acquire the artwork data with the privacy information filtered out from the cache, and provide an interface for the application a to call.
Filtration point 2: the picture codec library 608 may store the decoded original image data in a cache after decoding the picture file. The Exif data optimization module 605 may invoke the artwork acquisition module 607 to filter out private information of the original artwork data in the cache. The original image obtaining module 607 may provide an interface to the application a to retrieve the original image data with the filtered privacy information after filtering the privacy information of the original image data.
2. When an application B (e.g., a gallery application) needs to obtain Exif data of a picture file, the Exif data optimization module 605 may determine whether the application B has permission to access private information in the picture file. If the application B does not have permission to access the private information in the picture file, the Exif data optimization module 605 may call the Exif data acquisition module 604 to filter out the private information in the Exif data after acquiring the Exif data.
When the Exif data acquiring module 604 acquires the whole Exif data in the picture file, the Exif data acquiring module 604 may delete the private information in the acquired Exif data, and report the Exif data with the private information deleted to the application B. When the Exif data acquiring module 604 needs to acquire information 1 (e.g., GPS location information) in the Exif data, the Exif data acquiring module 604 may determine whether the information 1 is private information, and if so, the Exif data acquiring module 604 may return a rejection instruction to the application B, where the rejection instruction is used to indicate that the application B has no right to acquire the information 1.
3. When an application C (e.g., an application such as a QQ) needs to obtain a thumbnail of a picture file, the Exif data optimization module 605 may determine whether the application C has permission to access private information in the picture file. If the application C does not have permission to access the private information in the picture file, the Exif data optimization module 605 may call the thumbnail acquisition module 606 to acquire the thumbnail data and the thumbnail Exif information, filter the private information in the thumbnail Exif information, and provide an interface for the application C to call the thumbnail data and the thumbnail Exif information after filtering the private information.
In a possible implementation manner, the Exif data optimization module 605 may determine whether the application C has permission to access the thumbnail in the picture folder, and if the application C does not have permission to access the thumbnail, the Exif data optimization module 606 may instruct the thumbnail obtaining module 606 to reject the thumbnail obtaining request of the application C.
The following describes a User Interface (UI) involved in setting permissions for an application by a user in the embodiment of the present application.
As shown in fig. 7A, the electronic device 100 may display a home screen interface 710 on the touch screen, the home screen interface 710 displaying a page in which application icons are placed, the page including a plurality of application icons (e.g., a weather application icon, a stock application icon, a calculator application icon, a setting application icon 711, a mail application icon, a pay treasure application icon, a facebook application icon, a browser application icon, a gallery application icon, a music application icon, a video application icon, a WeChat application icon). A page indicator is also included below the plurality of application icons to indicate the positional relationship of the currently displayed page with other pages. Below the page indicator are a plurality of tray icons (e.g., a dialing application icon, an information application icon, a contacts application icon, a camera application icon), which remain displayed upon page switching, a page may include a plurality of application icons and page indicators; the page indicator may not be a part of the page, and may exist separately, and the tray icon is also optional, which is not limited in this embodiment of the present application.
The electronic apparatus 100 may receive an input operation (e.g., a single click) by the user with respect to the setting application icon 711, and in response to the input operation, the electronic apparatus 100 may display the setting home interface 720 as shown in fig. 7B.
As shown in fig. 7B, the settings main interface 720 display includes wireless and network settings, device connection settings, application settings 721, battery settings, display settings, voice settings, storage settings, security and privacy settings, user and account settings, system settings, and the like. Wherein the wireless and network setup items may be used to setup WLAN, dual card management, mobile network, etc. The device connection setup items may be used to set up bluetooth, NFC, cell phone screen projection, etc. The application settings entry 721 may be used to set rights management, default applications, application affiliations, and the like. The battery setting entry may be used to set a power saving mode and display power consumption ranks, and the like. The display setting items may be used to set display brightness, desktop style, font and display size, etc. of the electronic device. The sound setting items may be used to set do-not-disturb, ring tone, vibration, etc. The storage setup entries may be used to clear memory acceleration, and the like. Security and privacy may be used to set face unlock, fingerprint, screen lock password, etc. User and account setup entries may be used to set up multiple users, cloud spaces, accounts, and so on. The system setup entries may be used to set system navigation, software updates, languages, and input methods, etc.
The electronic apparatus 100 may receive an input operation (e.g., a single click) by the user for the application setting item 721, and in response to the input operation, the electronic apparatus 100 may display an application setting interface 730 as illustrated in fig. 7C.
As shown in fig. 7C, the application setting interface 730 includes an application management setting item, an application start setting item, a rights management setting item 731, a default application setting item, an application avatar setting item, and the like. The application management setting item can be used to set storage, start running, close running, and the like of the installed application program on the electronic device 100. The application launch settings entry may be used to set an automatic management launch of an installed application on the electronic device 100. The rights management setting entry 731 can be used to set access rights of an installed application on the electronic device 100. The default application settings entry may be used to set the application that is preferentially selected when a function (e.g., document browsing) is opened. The application-based setting item can be used for setting the base of the application installed on the electronic device 100, and can be used for a user to log in different user accounts on two applications of the base.
The electronic apparatus 100 may receive an input operation (e.g., a single click) of a user with respect to the rights management setting item 731, and in response to the input operation, the electronic apparatus 100 may display a rights management interface 740 as shown in fig. 7D.
As shown in fig. 7D, the rights management interface 740 may display a display including a storage rights setting item, a phone rights setting item, a location information rights setting item, a camera rights setting item, a microphone rights setting item, an address book rights setting item, an information rights setting item, a picture rights setting item 741, and the like. Wherein the storage authority setting item can be used for setting the authority of the installed application program on the electronic device 100 to access the storage. The phone right setting entry may be used to set the right of the application installed in the electronic device 100 to access the phone function. The location information setting item may be used to set the authority of the installed application on the electronic device 100 to open the positioning function. The camera authority setting entry may be used to set the authority of the installed application on the electronic device 100 to open the camera function. The microphone permission setting entry may be used to set a permission for an installed application on the electronic device 100 to open a microphone function. The address book permission setting item can be used for setting permission of an application program installed on the electronic device 100 to access the address book. The information permission setting item can be used for setting the permission of an application program installed on the electronic device 100 to read, send and receive the short message/multimedia message. The picture permission setting entry may be used to set permission for an application installed on the electronic device 100 to access a picture file already stored on the electronic device 100 (e.g., permission to acquire privacy information in the picture file, permission to acquire Exif data of the picture file alone, permission to acquire a thumbnail, etc.).
The electronic apparatus 100 may receive an input operation (e.g., a single click) of a user with respect to the picture authority setting item 741, and in response to the input operation, the electronic apparatus 100 may display a picture authority setting interface 750 as in fig. 7E.
As shown in fig. 7E, the picture authority setting interface 750 may include a picture privacy information filter entry 751, a picture thumbnail filter entry 752, and the like. The picture privacy information filter entry 751 can be used for setting the authority of an application program for accessing the privacy information in the picture file stored on the electronic device 100. The picture thumbnail filter entry 752 may be used to set permissions for an application to access thumbnails in stored picture files on the electronic device 100.
The electronic device 100 may receive an input operation of the user for the picture privacy information filter entry 751, and in response to the input operation, the electronic device 100 may set the picture privacy information setting interface 760 as shown in fig. 7F.
As shown in fig. 7F, the picture privacy information setting interface 760 may display a display that includes one or more application setting options (e.g., a WeChat setting option, a facebook setting option, a twitter setting option, a QQ setting option, a gallery setting option, etc.). And each application setting option is provided with a switch control which can be used for turning on or turning off the privacy information filtering function when the application accesses the picture. For example, a switch control 761 on the options of the WeChat application may be used to turn on/off the filtering function of private information when the WeChat application accesses pictures. A full selection switch 762 may be further displayed on the picture privacy information setting interface 760, and when the full selection switch is in an on state, the setting application may open switch controls corresponding to all application setting options in the picture privacy information setting interface 760.
Electronic device 100 may receive an input operation by a user for switch control 761, in response to which electronic device 100 may turn on private information filtering when accessing pictures for a WeChat application.
As shown in fig. 7G, when the electronic device 100 turns on the private information filtering for the WeChat application to access the picture in response to receiving an input operation of the user for the switch control 761, the switch control 761 on the WeChat application option in the picture private information setting interface 760 may be in an on state.
The following describes an image processing method provided by the present application with reference to an application scenario.
The electronic device 100 may store relevant information (e.g., photographing parameters, photographing device model, photographing mode, photographing time, photographing address information, portrait mood information, etc.) of a picture in Exif data of the picture after the camera is turned on through the camera application and the picture is taken. When the user needs to view the related information of the picture, if the gallery application has the right to read the Exif data of the picture, the user may open the gallery application on the electronic device 100 to view the related information of the picture (e.g., shooting parameters, shooting device model, shooting mode, shooting time, shooting address information, etc.).
Illustratively, as shown in FIG. 8A, electronic device 100 displays a picture browsing interface 810. The picture browsing interface 810 can display a picture 811, and a shooting place 812 (e.g., "shenzhen") and a shooting time 813 (e.g., "3: 54 pm on 7/15/7/2019") corresponding to the picture 811, a picture detail information control 814, a sharing function control, a collecting function control, an editing function control, a deleting function control, more function controls, and the like.
The electronic device 100 may receive an input operation (e.g., a single click) by the user with respect to the picture detail control 814, and in response to the input operation, the electronic device 100 may display a picture detail window 820 as shown in fig. 8B.
As shown in fig. 8B, the picture detail information window 820 displays the detail information including the picture 811. The detailed information may include a storage name, a photographing parameter, a photographing apparatus model, a photographing mode, a storage path, and the like. For example, the storage name of the picture 811 may be "IMG _20190715_ 155430". The shooting parameters of the picture 811 may be "sensitivity (ISO) 50, shutter speed 1/3279s, focus mode auto focus (AF-a), white balance (AWB) on state, exposure compensation (EV) 0, aperture (F) 1.8, flash auto mode, focal length 27mm (equivalent 35mm film focal length), and so on. The shooting device model of the picture 811 may be "EML-AL 00", and the shooting mode may be "normal". The storage path of the picture 811 is "internal storage/DCIM/Camera/IMG _20190715_ 155430". The detailed picture information may also include portrait mood information of the picture, that is, mood information of people in the picture (for example, happy or too happy or worried, etc.) identified by the electronic device 100 through AI. The above examples are merely illustrative of the present application and should not be construed as limiting.
In some application scenarios, the electronic device 100 may send a picture file stored locally on the electronic device 100 to other devices through a communication application (e.g., a WeChat application, etc.). When the communication application does not have permission to access the privacy information in the picture file on the electronic device 100, the electronic device 100 may filter the privacy information in the picture file before the communication application acquires the picture file. The privacy information may include one or more of shooting address information, shooting device model, shooting mode, shooting time, portrait mood information, and the like. In this way, the electronic device 100 may not change the original picture data stored in the mobile phone itself, and dynamically delete the privacy information in the picture data when reading the picture data, thereby protecting the privacy of the user.
Illustratively, as shown in fig. 9A, the electronic device 100 may be displayed with a home screen interface 910, wherein the home screen interface 910 includes one or more application icons (e.g., a weather application icon, a stock application icon, a calculator application icon, a setup application icon, a mail application icon, a pay treasure application icon, a facebook application icon, a browser application icon, a gallery application icon, a music application icon, a video application icon, a WeChat application icon 911). Since the main screen interface 910 in fig. 9A is the same as the main screen interface 710 shown in fig. 7A, the text description for the main screen interface 710 in fig. 7A is also applicable to the main screen interface 910 in fig. 9A, and is not repeated herein.
The electronic device 100 may receive an input operation (e.g., a single click) by the user with respect to the wechat application icon 911, and in response to the input operation, the electronic device 100 may display a wechat application interface 920 as shown in fig. 9B.
As shown in fig. 9B, the wechat application interface 920 includes a message browsing page 921 and a menu 923. The menu 923 includes a WeChat control 924, a contacts control 925, a discovery control 926, and a My control 927. The wechat control 924 is configured to trigger the terminal 100 to display the message browsing page 921. The contacts control 925 may be used to trigger the terminal 100 to display a page that includes a plurality of WeChat contacts options. The discovery control 926 may be used to trigger the terminal 100 to display a page including functionality controls for a friend circle, a sweep, etc. The my control 927 may be used to trigger the terminal 100 to display a page containing information such as the personal profile of the WeChat user. The message view page 921 includes one or more message options (e.g., a contact "MAC" message option 922, a contact "Kate" message option, a mailbox reminder message option, a subscription number message option, a contact group "workgroup 1" message option, a WeChat sports message option, a contact group "gym" message option).
Terminal 100 may receive an operation by the user on message option 922, in response to which terminal 100 may display chat interface 930 as shown in fig. 9C.
As shown in fig. 9C, the chat interface 930 display includes a contact name (e.g., "MAC"), a voice input control 931, a text input box 932, an emoticon control 933, and a more functionality control 934. The voice input control 931 may be configured to trigger the terminal 100 to display the text input box 932 instead as a voice input box. The text input box 932 may be used to display text or emoticons entered by the user. The emoticon 933 can be used to trigger the terminal 100 to display one or more transmittable emoticons. The more functionality control 934 may be used to trigger the terminal 100 to display more WeChat chat functionality controls (e.g., a picture send control, a video send control, a photo send control, etc.).
The electronic device 100 may receive an input operation (e.g., a single click) by the user for the more control 934, and in response to the input operation, the electronic device 100 may display a functionality control page 935 as shown in fig. 9D.
As shown in fig. 9D, the functionality control page 935 includes one or more functionality controls (e.g., album functionality control 936, camera functionality control, video call functionality control, location functionality control, red pack functionality control, transfer functionality control, voice input functionality control, favorites functionality control, etc.) displayed therein. The album function control 936 may be configured to trigger selection of a picture to be sent. The camera function control can be used for triggering the electronic device 100 to start a camera to take a picture, and sending the taken picture to the device of the contact person. The location functionality control can be used to send the current location information of the electronic device 100 to the contact's device. The red packet function control and the transfer function control can be used for triggering electronic transfer to an account of a contact person. The voice input functionality control can be used to trigger the collection of a user's voice and transmission to a contact's device. The favorite functionality control can be used to open files (e.g., pictures, documents, music, videos, etc.) that the user has favorite on the WeChat application.
The electronic device 100 receives an input operation (e.g., a single click) by the user with respect to the album function control 936, and in response to the input operation, the electronic device 100 may display a picture selection interface 940 as shown in fig. 9E.
As shown in fig. 9E, the picture selection interface 940 may include thumbnails of one or more pictures. Wherein each thumbnail may have a mark displayed thereon. The flag may be used to indicate whether the user selected the picture corresponding to the thumbnail. For example, the picture corresponding to the thumbnail 941 may be the picture 811 in fig. 8A, and the thumbnail 941 has a mark 942 displayed thereon, where the mark 942 is currently in an unselected state to indicate that the picture corresponding to the thumbnail 941 is unselected by the user. The picture selection interface 940 may include artwork selection controls 943, and the artwork selection controls 943 may be used by the electronic device 100 to send a picture selected by a user to a device of a contact without compression. The original function control 943 is currently in an off state, which is used to indicate that the electronic device 100 is currently compressing the picture to be sent selected by the user.
The electronic apparatus 100 can receive an input operation (e.g., a single click) by the user on the thumbnail 941, and in response to the input operation, the mark 942 that the electronic apparatus 100 can have on the thumbnail 941 can be switched to the selected state. The mark 942, when in a selected state, can be used to indicate that the picture corresponding to the thumbnail 941 has been selected by the user. The electronic apparatus 100 may receive an input operation (e.g., a single click) by the user on the original function control 943, and in response to the input operation, the electronic apparatus 100 may switch the original function control to the on state.
As shown in fig. 9F, the user has selected the picture corresponding to thumbnail 941. The mark 942 on the thumbnail image 941 is in a selected state. The original function control 943 is in an open state. After the user selects thumbnail 941, electronic device 100 may display send control 944 on picture selection interface 940.
The electronic device 100 may receive an input operation (e.g., a single click) by a user with respect to the sending control 944, in response to which the electronic device 100 may determine whether the wechat application has authority to access the private information of the picture (e.g., shooting address information, shooting time, shooting device model, shooting mode, etc.), and if the wechat application does not have authority to access the private information of the picture, the electronic device 100 may filter (may also be referred to as delete) the private information (e.g., shooting address information, shooting time, shooting device model, shooting mode, etc.) in the Exif data of the picture before the wechat application acquires the picture corresponding to the thumbnail 941.
When encoding and decoding the picture corresponding to the thumbnail 941, the electronic device 100 may filter out privacy information in Exif data of the picture, and store the picture data with the filtered (also referred to as deleted) privacy information in a cache for the wechat application to read. In another possible implementation manner, after encoding and decoding the picture corresponding to the thumbnail 941, the electronic device 100 may store the encoded and decoded picture data in a cache, then filter (may also be referred to as delete) the privacy information in the Exif data of the picture data in the cache, and then return the picture data with the filtered privacy information to the wechat application. In this way, the electronic device 100 may not change the original picture data stored in the mobile phone itself, and dynamically delete the privacy information in the picture data when reading the picture data, thereby protecting the privacy of the user. For specific implementation, reference may be made to the foregoing embodiment shown in fig. 6, which is not described herein again.
After filtering out the privacy information (e.g., shooting address information, shooting time, shooting device model, shooting mode, etc.) in the picture selected by the user, the electronic device 100 may send the picture with the filtered privacy information to the device of the contact.
In one possible implementation, the electronic device 100 may directly send the picture of the filtered privacy information to a server of the WeChat application, and then the server sends the picture of the filtered privacy information to a device (e.g., the electronic device 101) of the contact. In another possible implementation, the electronic device 100 may send a picture of the filtered private information to a file server of the WeChat application. The electronic device 100 then sends the link to the picture to the device of the contact (e.g., electronic device 101) via the messaging server of the WeChat application. After the device of the contact (e.g., the electronic device 101) acquires the link of the picture through the communication server of the wechat application, the picture can be downloaded from the server according to the link of the picture.
As shown in fig. 9G, after the electronic device 100 sends the picture corresponding to the thumbnail 941 to the contact (e.g., "MAC") through the wechat application, the thumbnail 951 may be displayed in the chat interface 930. The thumbnail 951 and the thumbnail 941 in fig. 9E are from the same picture.
After the device of the contact (e.g., electronic device 101) receives the picture sent by electronic device 100 through the WeChat application, the device of the contact may be stored locally. The user may view the picture and the picture related information in a gallery on the contact's device. Wherein the privacy information (e.g., shooting address information, shooting mode, shooting time, camera type, etc.) in the picture acquired by the contact's device (electronic device 101) has been filtered. That is, the user cannot view the private information of the picture from the electronic device 101.
Illustratively, as shown in FIG. 10A, the device of the contact may be an electronic device 101. A chat interface 1010 with a WeChat application is displayed on the electronic device 101. Wherein the contact of the chat interface 1010 is "Daniel". The device of the contact "Daniel" may be the electronic device 100 in the foregoing embodiment. The chat interface 1010 includes a name of the contact (e.g., "Daniel"), an avatar of the contact, a chat message 1015, a voice input control 1011, a text input control 1012, an emoticon control 1013, a more control 1014, and the like. Here, the chat message 1015 is a thumbnail corresponding to a picture sent by the device (electronic device 100) of the contact "Daniel".
The electronic device 101 may receive an input operation (e.g., a single click) by the user for the chat message 1015, and in response to the input operation, the electronic device 101 may display a picture presentation interface 1020 as shown in fig. 10B.
As shown in fig. 10B, the electronic device 101 may be displayed with a picture 1021 and a save control 1022. The picture 1021 is sent to the electronic device 101 by the electronic device 100 through the WeChat application. The save control 1022 may be used to trigger the electronic device 101 to save the picture 1021 to a local folder (e.g., the storage path of the picture 1021 may be "internal storage/DCIM/weixin/IMG _20190715_ 155430").
After the electronic device 101 stores the picture 1021 locally, the user can view the picture 1021 and the related information of the picture 1021 in the gallery application.
Illustratively, as shown in FIG. 10C, the electronic device 101 is displayed with a gallery application interface 1030. One or more albums (e.g., all photo albums, video albums, camera albums, screen shot catalog albums, WeChat album 1031, microblog albums, etc.) may be displayed in the gallery application interface 1030. The picture 1021 is stored in the wechat album 1031.
The electronic device 101 may receive an input operation (e.g., a single click) by the user with respect to the wechat album application 1031, and in response to the input operation, the electronic device 101 may display a wechat album interface 1040 as shown in fig. 10D.
As shown in fig. 10D, the wechat album interface 1040 displays thumbnails including one or more pictures (e.g., the thumbnail 1041 of the picture 1021, etc.).
The electronic device 101 may receive an input operation (e.g., a single click) by the user for the thumbnail 1041, and in response to the input operation, the electronic device 101 may display a picture browsing interface 1050 as shown in fig. 10E.
As shown in fig. 10E, the picture browsing interface 1050 displays a picture 1021, a picture saving time (for example, "8: 08 am 11/15/2019"), a picture detail information control 1052, a sharing function control, a collecting function control, an editing function control, a deleting function control, a more function control, and the like.
The electronic device 101 may receive an input operation (e.g., a single click) by the user with respect to the picture detail information control 1052, and in response to the input operation, the electronic device 100 may display a picture detail information window 1060 as shown in fig. 10F.
As shown in fig. 10F, the detailed information of the picture 1021 is displayed in the picture detailed information window 1060. The detailed information of the picture 1021 may include a storage name, a shooting parameter, a storage path, and the like. For example, the storage name of the picture 1021 may be "IMG _20190715_ 155430". The shooting parameters of the picture 811 may be "sensitivity (ISO) 50, shutter speed 1/3279s, focus mode auto focus (AF-a), white balance (AWB) on state, exposure compensation (EV) 0, aperture (F) 1.8, flash auto mode, focal length 27mm (equivalent 35mm film focal length), and so on. The storage path of the picture 1021 is "internal storage/DCIM/Camera/IMG _20190715_ 155430". Wherein the electronic device 101 cannot acquire the privacy information (e.g., shooting address information, shooting mode, shooting time, camera type, etc.) of the picture 1021. The above examples are merely illustrative of the present application and should not be construed as limiting.
In some application scenarios, an application on the electronic device 100 may separately obtain Exif data for a picture. When an application on the electronic device 100 requests to acquire the Exif data of the photo, the electronic device 100 may determine whether the application has the right to acquire the Exif data of the euro-gram. If the application does not have permission to access the private information in the picture file on the electronic device 100, the electronic device 100 may filter the private information in the Exif data before the application acquires the Exif data of the picture. In this way, the electronic device 100 may not change the original picture data stored in the mobile phone itself, and when the application reads the Exif data, the privacy information in the picture data is dynamically deleted, thereby protecting the privacy of the user.
In some application scenarios, an application on the electronic device 100 may separately obtain thumbnails of pictures and thumbnail Exif information. When an application on the electronic device 100 requests to acquire a thumbnail of a picture and thumbnail Exif information, the electronic device 100 may determine whether the application has the right to acquire Exif data of an european image. If the application does not have permission to access the thumbnail and the thumbnail Exif information in the picture file on the electronic device 100, the electronic device 100 may reject the request of the application. In this way, the electronic device 100 may not change the original picture data stored in the mobile phone itself, and when an unauthorized application requests to acquire the thumbnail and the thumbnail Exif information, the request is rejected, thereby protecting the privacy of the user.
In some application scenarios, the electronic device 100 may save the picture to a cloud server and bind with the cloud account of user a. When the user a needs to share the picture on the cloud account with the user B, the electronic device 100 may send the acquisition address of the picture (or a file including multiple pictures) selected by the user a on the cloud server to the device of the user B (e.g., the electronic device 101) in a specified manner. After receiving the acquisition address of the picture, the device (e.g., the electronic device 101) of the user B may acquire a thumbnail of the picture from the cloud server and display the thumbnail, or receive an operation of the user B to download the picture shared by the user a from the cloud server. The cloud server may encrypt the private information in the Exif data of the picture, and then send the picture with the encrypted private information to a device (e.g., the electronic device 101) of the user B. Therefore, when the electronic device 100 shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
Illustratively, as shown in FIG. 11A, electronic device 100 displays a gallery interface 1110. The gallery interface 1110 may include one or more albums (e.g., all photo albums, favorites albums, camera albums, screen capture catalog albums, travel albums 1111, microblog albums, etc.). Each photo album may include one or more pictures. For example, the travel photo album 1111 may include 2 pictures therein.
The electronic apparatus 100 may receive an input operation (e.g., long press) by the user with respect to the travel album 1111, and in response to the input operation, the electronic apparatus 100 may display the function window 1120 as shown in fig. 11B. The pictures included in the travel photo album 1111 may be stored on the cloud server and bound to the cloud account a.
As shown in FIG. 11B, the functionality window 1120 may be displayed including one or more functionality options (e.g., a set-top option, a delete option, a rename option, a share option 1121, a move to other album option, etc.).
The electronic device 100 may receive an input operation (e.g., a single click) by the user for the sharing option 1121, and in response to the input operation, the electronic device 100 may display an album sharing interface 1130 as shown in fig. 11C.
As shown in fig. 11C, the album sharing interface 1130 displays a list of available album members, an album member adding control 1132, a list of albums to be shared, an album adding control 1134, a public album sharing control 1135, and an album address sending entry 1136. Only the sharing party (cloud account a) of the travel album 1111 can obtain the information currently, and therefore the album member list includes the identifier 1131 corresponding to the cloud account a. The current photo album to be shared is the travel photo album 1111, so the list of the photo albums to be shared includes the identifier 1133 corresponding to the travel photo album 1111. The album member add control 1132 may be used to add an account for obtaining the album to be shared. The photo album 1134 to be shared may be used to add a photo album to be shared. Each photo album to be shared comprises one or more pictures. The publicly shared album control 1135 may be used to open or close the publicly selected album. Currently, the publicly shared album control 1135 is in a closed state. The album address send control 1136 may be used to trigger the electronic device 100 to send the acquired address of the selected album to other devices.
The electronic device 100 may receive an input operation (e.g., a single click) from a user with respect to the publicly-shared album control 1135, and in response to the input operation, the electronic device 100 may open the function of the publicly-shared album.
As shown in fig. 11D, the electronic device 100 has opened the public sharing album function, and the public sharing album control 1135 is in an open state. The electronic device 100 may display the two-dimensional code 1137 on the album sharing interface 1130. The two-dimensional code 1137 may be used for scanning by other devices, so that the other devices acquire the acquisition address corresponding to the travel album 1133.
The user name of the cloud account a logged in on the electronic device 100 may be "Daniel", the cloud account B may be logged in on the electronic device 101, and the user name of the cloud account B may be "MAC".
The electronic device 101 may obtain the album (or the picture) shared by the electronic device 100 through the cloud account a by: 1. the electronic device 101 may obtain an obtaining address of an album (e.g., the travel album 1111) to be shared by the electronic device 100 by scanning the two-dimensional code 1137 of the album sharing interface 1130 shown in fig. 11D. 2. The electronic device 100 may receive and respond to the input operation with respect to the album address transmission control 1136 shown in fig. 11C, and transmit the acquired address of the album to be shared (e.g., the travel album 1111) to the electronic device 101 through a social application or the like. 3. The electronic device 100 may add the cloud account B corresponding to the electronic device 101 to the album member list, and send the acquired address of the album to be shared (e.g., the travel album 1111) to the electronic device 101 logged in with the cloud account B through the cloud server.
For example, as shown in fig. 11E, the electronic device 100 may add the cloud account B corresponding to the electronic device 101 to the album member list. The album member list may display an identifier 1131 corresponding to the cloud account a logged in on the electronic device 100 and an identifier 1138 corresponding to the cloud account B logged in on the electronic device 101. The electronic device 100 may send an acquisition address of an album (e.g., the travel album 1111) to be shared to the electronic device 101 logged in with the cloud account B through the cloud server.
After receiving the acquisition address of the album to be shared (e.g., the travel album 1111), the electronic device 101 may send an album acquisition request to the cloud server according to the acquisition address. After receiving the acquisition address of the album to be shared (e.g., the travel album 1111), the cloud server may send the thumbnail corresponding to each picture included in the album to be shared (e.g., the travel album 1111) to the electronic device 101.
Illustratively, as shown in fig. 12A, the electronic device 101 may be displayed with a cloud album interface 1210. The cloud album interface 1210 displays thumbnails (e.g., thumbnail 1211 and thumbnail 1212) of picture files included in an album (e.g., the travel album 1111) to be shared by the electronic device 100.
The electronic device 101 may receive an input operation of a user for the thumbnail 1211, and in response to the input operation, the electronic device 101 may acquire an acquisition address of the thumbnail 1211 corresponding to the picture file and download the picture file from the cloud server to the local according to the acquisition address of the picture file. The cloud server may send the picture file to the electronic device 101 after encrypting the privacy information in the Exif data in the picture file.
For example, as shown in fig. 12B, the electronic device 101 may receive and respond to an input operation (e.g., a single click) of the thumbnail 1211 by a user, and obtain a picture file corresponding to the thumbnail 1211 from the cloud server. After acquiring the picture file corresponding to the thumbnail 1211, the electronic device 101 may store the picture file in a cache, acquire non-private information in the main image data and the Exif data from the picture file, and display a picture 1221.
In some embodiments, the electronic device 100 may specify that some other users' devices are authorized to obtain the private information in the shared picture. Specifically, the electronic device 100 may send a device identifier (e.g., a cloud account ID) that has a right to acquire the private information in the picture file to the cloud server. After receiving a picture acquisition request for the picture file a sent by the electronic device 101 (with the cloud account B logged in), the cloud server may determine whether the electronic device 101 has the authority to acquire the privacy information in the picture file according to a device identifier (for example, a cloud account ID) of the electronic device 101. If the image file has the authority, the cloud server may send the image file a with the encrypted private information and the encryption key to the electronic device 101. If the authority does not exist, the cloud server may send the picture file a with the encrypted privacy information to the electronic device 101. In this way, the electronic device 100 may enable different recipients to set different picture file obtaining permissions, and may enable devices of the recipients (e.g., relatives, coworkers, etc.) specified by the user to obtain the privacy information in the shared picture file, and devices of other recipients (e.g., strangers) may not obtain the privacy information in the shared picture file, thereby protecting the privacy of the user
In one possible implementation manner, the electronic device 100 may encrypt the private information in the local picture, and then send the picture data after encrypting the private information and the key to the cloud server. When the electronic device 100 wants to share a picture with other devices, the electronic device 100 may send an identifier of a device that has a right to acquire privacy information in the picture to be shared to the cloud server. When the cloud server receives a request for obtaining a picture to be shared, which is sent by another device (e.g., the electronic device 101), the cloud server may determine, according to a device identifier (e.g., a cloud account) of the other device (e.g., the electronic device 101), whether the other device (e.g., the electronic device 101) has a right to obtain privacy information of the picture to be shared. If another device (e.g., the electronic device 101) has permission to acquire the privacy information of the picture to be shared, the cloud server may send the picture to be shared and the key after encrypting the privacy information to the other device (e.g., the electronic device 101). If the other device does not have the right to acquire the privacy information of the picture to be shared, the cloud server may send the picture to be shared after encrypting the privacy information to the other device (for example, the electronic device 101).
In some embodiments, if an application a (e.g., a cloud album application) has permission to access privacy information of a picture on the electronic device 100, after determining a receiving device (e.g., the electronic device 101 logged in a cloud account B) of the picture to be shared, the electronic device 100 may determine whether avatar information of an account (e.g., the cloud account B) on the receiving device (e.g., the electronic device 101) is included in the picture to be shared. That is, the electronic device 100 may determine whether the picture to be shared includes the avatar of the account setup on the receiving device. When the avatar information corresponding to the account on the receiving device (e.g., the electronic device 101) is included in the picture to be shared, the electronic device 100 may send the picture to be shared to the receiving device (e.g., the electronic device 101) through the application a. When the avatar information corresponding to the account on the receiving device (e.g., the electronic device 101) is not included in the picture to be shared, the electronic device 100 may delete the privacy information in the picture to be shared, and then send the picture to be shared after the privacy information is deleted to the receiving device through the application a. Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation manner, when avatar information corresponding to an account on a receiving device (e.g., the electronic device 101) is included in a picture to be shared, the electronic device 100 may send the picture to be shared with encrypted privacy information and a key for decryption to a second electronic device through the application a. When the avatar information corresponding to the account on the receiving device (e.g., the electronic device 101) is not included in the picture to be shared, the electronic device 100 may send the picture to be shared, which is encrypted with the privacy information, to the receiving device (e.g., the electronic device 101) through the application a.
In some embodiments, the electronic device 100 may upload the local picture files to the cloud server for storage through an application a (e.g., a cloud photo album application). The electronic device 100 may browse the picture file saved in the storage space of the cloud account a on the cloud server by logging in the cloud account a on the application a. The electronic device 100 may share the picture to be shared selected by the user on the cloud server to the device corresponding to the other cloud account. The cloud server may determine whether avatar information of a cloud account logged in a receiving device (e.g., the electronic device 101) requesting to acquire the picture to be shared is included in the picture to be shared. If so, the cloud server may send the picture to be shared to a receiving device (e.g., the electronic device 101). If not, the cloud server may delete the privacy information in the picture to be shared, and then send the picture to be shared after deleting the privacy information to the receiving device (e.g., the electronic device 101). Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected.
In some possible implementations, when avatar information corresponding to an account on a receiving device (e.g., the electronic device 101) is included in the picture to be shared, the cloud server may send the picture to be shared with the encrypted privacy information and the key for decryption to the second electronic device. When the avatar information corresponding to the account on the receiving device (e.g., the electronic device 101) is not included in the picture to be shared, the cloud server may send the picture to be shared after encrypting the privacy information to the receiving device (e.g., the electronic device 101).
Referring to fig. 13, fig. 13 shows a picture processing method according to an embodiment of the present application. In the embodiment of the present application, the first electronic device may be the electronic device 100 described above, and the second electronic device may be the electronic device 101 described above. As shown in fig. 13, the method includes:
s1301, the first electronic device receives first input of a user for the first application.
The first application may be the WeChat application in the embodiment shown in fig. 9A to 9G, and the first input may be an input operation (e.g., a single click) to the send control 944 shown in fig. 9F.
S1302, the first electronic device responds to the first input and acquires first picture data.
The first electronic device may first obtain a storage path of the first picture data, and then obtain the first picture data according to the storage path of the first picture data. The specific process of the first electronic device obtaining the first picture data may refer to the embodiment shown in fig. 6 and other illustrated embodiments, which are not described herein again. The first picture data may be a picture file corresponding to the thumbnail 941 in the embodiment shown in fig. 9F described above.
S1303, when the first application does not have the right to access the privacy information of the picture, the first electronic device deletes the privacy information in the first picture data.
The first electronic device may determine whether the first application has an authority to access the private information of the picture, and if not, the first electronic device may delete the private information in the first picture data.
In an embodiment of the present application, the privacy information may include one or more of the following: shooting address information, shooting time information, shooting device model information, shooting mode information, portrait mood information, and the like. In some possible implementations, the private information also includes some other information selected by the user from the Exif data.
The process of deleting the privacy information in the first picture data by the first electronic device can be implemented in the following two ways: 1. the first electronic device may decode the first picture data first and store the decoded first picture data in a designated buffer. Then, the first electronic device deletes the privacy information in the first picture data in the designated cache. 2. The first electronic device may decode the first picture data and delete the privacy information in the first picture data in the encoding and decoding stage. Then, the first electronic device may store the first picture data from which the private information is deleted in a designated cache.
And S1304, the first electronic device sends the first picture data with the privacy information deleted to the second electronic device.
The first electronic device may be the electronic device 100 in the above-described embodiment, and the second electronic device may be the electronic device 101 in the above-described embodiment.
For example, as in the embodiments shown in fig. 9A to 9G, since the first application (e.g., the WeChat application) is set without authority to acquire the privacy information of the picture, the first electronic device (electronic device 100) may retransmit the picture file corresponding to the thumbnail 941 to the second electronic device (electronic device 101) after deleting the privacy information.
In one possible implementation, before the first electronic device receives the first input of the user for the first application, the method further includes: the first electronic device receives a second input from the user. In response to the second input, the first electronic device turns on or off the permission of the first application to access the private information of the picture. Therefore, the user can set the obtaining authority of the privacy information in the picture for the application on the first electronic device, and the privacy of the user is protected for different applications. Specifically, reference may be made to the embodiments shown in fig. 7A to 7G, which are not described herein again.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: the first electronic equipment encrypts the privacy information in the first picture data. When the second electronic device does not have the authority to acquire the privacy information of the first picture data, the first electronic device sends the first picture data with the encrypted privacy information to the second electronic device through the first application. Therefore, when the first electronic device shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected. Specifically, reference may be made to the embodiments shown in fig. 11A to 11E, which are not described herein again.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: the first electronic equipment encrypts the privacy information in the first picture data. When the second electronic device has the authority to acquire the privacy information of the first picture data, the first electronic device sends the first picture data and the key after the privacy information is encrypted to the second electronic device through the first application. The key is used for the second electronic device to decrypt the encrypted privacy information in the first picture data. Therefore, when the electronic device 100 shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected. For details, reference may be made to the embodiments shown in fig. 11A to fig. 11E, which are not described herein again.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: when the first electronic device determines that the avatar information corresponding to the account on the second electronic device is included in the first picture data, the first electronic device sends the first picture data to the second electronic device through the first application. When the first electronic device determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data, the first electronic device deletes the privacy information in the first picture data, and sends the first picture data with the privacy information deleted to the second electronic device through the first application. Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected. For details, reference may be made to the foregoing embodiments, which are not described again.
In a possible implementation manner, after the first electronic device sends the first picture data after deleting the privacy information to a designated contact of the first application, the method further includes: the first electronic device obtains a thumbnail from exchangeable image file format Exif data of the first picture data. The first electronic device displays the thumbnail. For details, reference may be made to the foregoing embodiment shown in fig. 9G, which is not described herein again.
In one possible implementation, when the first application has permission to access the private information of the picture, the method further includes: the first electronic device sends the first picture data to the second electronic device through the first application.
In an embodiment of the application, the privacy information may include one or more of: shooting address information, shooting time information, shooting device model information, shooting mode information, portrait mood information, and the like.
By the picture processing method, the user can set the authority of the application program to access the private information in the Exif data on the electronic equipment, and when some application or receiver does not have the authority to access the Exif data of the picture, the electronic equipment can dynamically delete the private information (such as GPS (global positioning system) position information, picture shooting time, picture shooting machine type and the like) in the Exif data in the process that the application acquires picture original pictures or independently acquires the Exif data. Therefore, the electronic equipment can dynamically delete the privacy information in the Exif data when the picture data is read or the Exif data in the picture data is read without changing the picture data stored in the mobile phone, and the user privacy is protected.
Referring to fig. 14, fig. 14 is a schematic diagram illustrating a functional unit of an electronic device 1400 provided in the present application. Wherein the electronic device 1400 may be the first electronic device (electronic device 100) in the above-described embodiments. As shown in fig. 14, the electronic device 1400 includes:
an input module 1410 configured to receive a first input of a user for a first application. An obtaining module 1420, configured to obtain first picture data in response to the first input. The processing module 1430 is configured to delete the private information in the first picture data when the first application does not have permission to access the private information of the picture. The sending module 1440 is configured to send the first picture data after the privacy information is deleted to the second electronic device through the first application.
In a possible implementation, the input module 1410 is further configured to receive a second input from the user. The first electronic device further includes: and the setting module is used for responding to the second input and opening or closing the permission of the first application for accessing the private information of the picture. Therefore, the user can set the obtaining authority of the privacy information in the picture for the application on the first electronic device, and the privacy of the user is protected for different applications.
In one possible implementation manner, the first electronic device further includes: and the encryption module is used for encrypting the privacy information in the first picture data when the first application has the authority to access the privacy information of the picture. The sending module 1440 is further configured to send the first picture data after encrypting the privacy information to the second electronic device through the first application when the second electronic device does not have the right to acquire the privacy information of the first picture data. Therefore, when the first electronic device shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation manner, the first electronic device further includes: and the encryption module is used for encrypting the privacy information in the first picture data when the first application has the authority to access the privacy information of the picture. The sending module 1440 is further configured to, when the second electronic device has permission to obtain the privacy information of the first picture data, send the first picture data and the key after encrypting the privacy information to the second electronic device through the first application. The key is used for the second electronic device to decrypt the encrypted privacy information in the first picture data. Therefore, when the electronic device 100 shares the picture with other devices, the other devices are prevented from acquiring the privacy information in the picture, and the privacy of the user is protected.
In a possible implementation manner, the processing module 1430 is further configured to determine whether avatar information corresponding to an account on the second electronic device is included in the first picture data. The sending module 1440 is further configured to send the first picture data to the second electronic device through the first application when the processing module determines that the avatar information corresponding to the account on the second electronic device is included in the first picture data. The sending module 1440 is further configured to send, by the first application, the first picture data with the privacy information deleted to the second electronic device when the processing module determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data. Therefore, only the receiver of the account avatar in the picture can acquire the privacy information in the picture, and the privacy of the user is protected.
In one possible implementation manner, the first electronic device further includes: and the coding and decoding module is used for decoding the first picture data and storing the decoded first picture data into a specified cache. The processing module 1430 is specifically configured to delete the privacy information in the first picture data in the specified cache. Therefore, the privacy information in the Exif data can be deleted dynamically when the picture data or the Exif data in the picture data is read without changing the picture data stored in the mobile phone.
In one possible implementation manner, the first electronic device further includes: and the coding and decoding module is used for decoding the first picture data. The processing module is specifically configured to delete the privacy information in the first picture data, and store the first picture data from which the privacy information is deleted in a specified cache. Therefore, the privacy information in the Exif data can be deleted dynamically when the picture data or the Exif data in the picture data is read without changing the picture data stored in the mobile phone.
In a possible implementation manner, the obtaining module 1420 is specifically configured to: responding to the first input, and acquiring a storage path of first picture data; and acquiring the first picture data according to the storage path of the first picture data.
In a possible implementation manner, the obtaining module 1420 is further configured to obtain a thumbnail from the exchangeable file format Exif data of the first picture data after the sending module sends the first picture data with the privacy information deleted to the second electronic device. The first electronic device further includes: and the display module is used for displaying the thumbnail after the sending module sends the first picture data with the privacy information deleted to the second electronic equipment.
In a possible implementation manner, the sending module 1440 is further configured to send the first picture data to the second electronic device when the first application has permission to access private information of a picture.
In one possible implementation, the privacy information includes one or more of: shooting address information, shooting time information, shooting equipment model information, shooting mode information and portrait mood information.
Through the embodiment of the application, the user can set the authority of the application program to access the private information in the Exif data on the first electronic device, and when some application or receiver does not have the authority to access the Exif data on the picture, the first electronic device can dynamically delete the private information (such as GPS (global positioning system) position information, picture shooting time, picture shooting machine type and the like) in the Exif data in the process that the application acquires picture original pictures or independently acquires the Exif data. Therefore, the first electronic device can dynamically delete the privacy information in the Exif data when the picture data or the Exif data in the picture data are read without changing the picture data stored in the mobile phone, and the user privacy is protected.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (24)

1. An image processing method, comprising:
the method comprises the steps that a first electronic device receives first input of a user for a first application;
responding to the first input, and acquiring first picture data by the first electronic equipment;
when the first application does not have the authority to access the privacy information of the picture, the first electronic equipment deletes the privacy information in the first picture data;
and the first electronic equipment sends the first picture data after the privacy information is deleted to second electronic equipment through the first application.
2. The method of claim 1, wherein before the first electronic device receives a first input by a user for a first application, the method further comprises:
the first electronic equipment receives a second input of the user;
in response to the second input, the first electronic device turns on or off the permission of the first application to access the private information of the picture.
3. The method of claim 1, wherein when the first application has permission to access private information of a picture, the method further comprises:
the first electronic equipment encrypts privacy information in the first picture data;
when the second electronic device does not have the authority to acquire the privacy information of the first picture data, the first electronic device sends the first picture data with the encrypted privacy information to the second electronic device through the first application.
4. The method of claim 1, wherein when the first application has permission to access private information of a picture, the method further comprises:
the first electronic equipment encrypts privacy information in the first picture data;
when the second electronic equipment has the authority to acquire the privacy information of the first picture data, the first electronic equipment sends the first picture data and the secret key after the privacy information is encrypted to the second electronic equipment through the first application; the key is used for the second electronic equipment to decrypt the encrypted privacy information in the first picture data.
5. The method of claim 1, wherein when the first application has permission to access private information of a picture, the method further comprises:
when the first electronic device determines that the avatar information corresponding to the account on the second electronic device is contained in the first picture data, the first electronic device sends the first picture data to the second electronic device through the first application;
when the first electronic device determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data, the first electronic device deletes the privacy information in the first picture data, and sends the first picture data with the privacy information deleted to the second electronic device through the first application.
6. The method according to claim 1, wherein the deleting, by the first electronic device, the private information in the first picture data specifically includes:
the first electronic equipment decodes the first picture data and stores the decoded first picture data into a designated cache;
the first electronic equipment deletes the privacy information in the first picture data in the appointed cache.
7. The method according to claim 1, wherein the deleting, by the first electronic device, the private information in the first picture data specifically includes:
the first electronic equipment decodes the first picture data and deletes the privacy information in the first picture data;
and the first electronic equipment stores the first picture data after the privacy information is deleted into a specified cache.
8. The method according to claim 1, wherein the acquiring, by the first electronic device, the first picture data specifically includes:
the first electronic equipment acquires a storage path of first picture data;
and the first electronic equipment acquires the first picture data according to the storage path of the first picture data.
9. The method according to claim 1, wherein after the first electronic device sends the first picture data after deleting the private information to a designated contact of the first application, the method further comprises:
the first electronic equipment acquires a thumbnail from exchangeable image file format Exif data of the first picture data;
the first electronic device displays the thumbnail.
10. The method of claim 1, wherein when the first application has permission to access private information of a picture, the method further comprises:
and the first electronic equipment sends the first picture data to the second electronic equipment through the first application.
11. The method of any of claims 1-10, wherein the private information includes one or more of: shooting address information, shooting time information, shooting equipment model information, shooting mode information and portrait mood information.
12. A first electronic device, comprising:
the input module is used for receiving first input of a user for a first application;
an obtaining module, configured to obtain first picture data in response to the first input;
the processing module is used for deleting the privacy information in the first picture data when the first application does not have the authority to access the privacy information of the picture;
and the sending module is used for sending the first picture data after the privacy information is deleted to second electronic equipment through the first application.
13. The first electronic device of claim 12, wherein the input module is further configured to receive a second input from a user;
the first electronic device further comprises: and the setting module is used for responding to the second input and opening or closing the authority of the first application to access the private information of the picture.
14. The first electronic device of claim 12, wherein the first electronic device further comprises:
the encryption module is used for encrypting the privacy information in the first picture data when the first application has the authority to access the privacy information of the picture;
the sending module is further configured to send the first picture data with the encrypted privacy information to the second electronic device through the first application when the second electronic device does not have the right to acquire the privacy information of the first picture data.
15. The first electronic device of claim 12, wherein the first electronic device further comprises:
the encryption module is used for encrypting the privacy information in the first picture data when the first application has the authority to access the privacy information of the picture;
the sending module is further configured to send the first picture data and the key after the privacy information is encrypted to the second electronic device through the first application when the second electronic device has the right to acquire the privacy information of the first picture data; the key is used for the second electronic equipment to decrypt the encrypted privacy information in the first picture data.
16. The first electronic device of claim 12, wherein the processing module is further configured to determine whether avatar information corresponding to an account on the second electronic device is included in the first picture data;
the sending module is further configured to send the first picture data to the second electronic device through the first application when the processing module determines that avatar information corresponding to the account on the second electronic device is included in the first picture data;
the sending module is further configured to send, by the first application, the first picture data from which the privacy information is deleted to the second electronic device when the processing module determines that the avatar information corresponding to the account on the second electronic device is not included in the first picture data.
17. The first electronic device of claim 12, wherein the first electronic device further comprises: the coding and decoding module is used for decoding the first picture data and storing the decoded first picture data into a specified cache;
the processing module is specifically configured to delete the privacy information in the first picture data in the specified cache.
18. The first electronic device of claim 12, wherein the first electronic device further comprises: the coding and decoding module is used for decoding the first picture data;
the processing module is specifically configured to delete the privacy information in the first picture data, and store the first picture data from which the privacy information is deleted in a specified cache.
19. The first electronic device of claim 12, wherein the obtaining module is specifically configured to:
responding to the first input, and acquiring a storage path of first picture data;
and acquiring the first picture data according to the storage path of the first picture data.
20. The first electronic device according to claim 12, wherein the obtaining module is further configured to obtain a thumbnail from exchangeable file format Exif data of the first picture data after the sending module sends the first picture data from which the privacy information is deleted to the second electronic device;
the first electronic device further comprises: and the display module is used for displaying the thumbnail after the sending module sends the first picture data with the privacy information deleted to the second electronic equipment.
21. The first electronic device of claim 12, wherein the sending module is further configured to send the first picture data to the second electronic device when the first application has permission to access private information of a picture.
22. The first electronic device of any of claims 12-21, wherein the private information includes one or more of: shooting address information, shooting time information, shooting equipment model information, shooting mode information and portrait mood information.
23. A first electronic device comprising a memory, a processor, and a touch screen, wherein the memory and the processor are coupled; the memory for storing computer program code comprising computer instructions which, when executed by the processor, the electronic device performs the method of any of claims 1-11.
24. A computer storage medium comprising computer instructions that, when executed on an electronic device, cause the electronic device to perform the method of any of claims 1-11.
CN201911209308.6A 2019-08-09 2019-11-30 Picture processing method and related device Active CN111143586B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/106822 WO2021027633A1 (en) 2019-08-09 2020-08-04 Picture processing method and related apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910735943 2019-08-09
CN2019107359431 2019-08-09

Publications (2)

Publication Number Publication Date
CN111143586A true CN111143586A (en) 2020-05-12
CN111143586B CN111143586B (en) 2023-09-08

Family

ID=70517473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911209308.6A Active CN111143586B (en) 2019-08-09 2019-11-30 Picture processing method and related device

Country Status (2)

Country Link
CN (1) CN111143586B (en)
WO (1) WO2021027633A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163200A (en) * 2020-09-27 2021-01-01 维沃移动通信(杭州)有限公司 Picture processing method and device and electronic equipment
WO2021027633A1 (en) * 2019-08-09 2021-02-18 华为技术有限公司 Picture processing method and related apparatus
CN112887590A (en) * 2021-01-11 2021-06-01 北京小米移动软件有限公司 Image processing method, device and storage medium
CN112887799A (en) * 2021-03-11 2021-06-01 北京小米移动软件有限公司 Image resource sharing method, device and medium
CN114288500A (en) * 2021-12-02 2022-04-08 中国科学院深圳先进技术研究院 Man-machine ventilation asynchronous detection model and device based on fuzzy entropy feature extraction
CN114547631A (en) * 2020-11-18 2022-05-27 成都鼎桥通信技术有限公司 Terminal control method and device and terminal
CN115374482A (en) * 2022-10-24 2022-11-22 荣耀终端有限公司 Image processing method and electronic device
CN116095226A (en) * 2022-08-03 2023-05-09 荣耀终端有限公司 Photo processing method and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011022641A (en) * 2009-07-13 2011-02-03 Nippon Telegr & Teleph Corp <Ntt> Privacy protection system and privacy protection method
CN104318177A (en) * 2014-10-29 2015-01-28 小米科技有限责任公司 Protection method and protection device for data of terminal equipment
US20150296170A1 (en) * 2014-04-11 2015-10-15 International Business Machines Corporation System and method for fine-grained control of privacy from image and video recording devices
CN105530261A (en) * 2015-12-23 2016-04-27 北京奇虎科技有限公司 Privacy information protecting method and device
CN106778335A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Method for secret protection and device, mobile terminal that a kind of application is installed
CN107025410A (en) * 2017-03-17 2017-08-08 北京珠穆朗玛移动通信有限公司 Image display method and electronic installation
CN107133498A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy application management method and device and mobile terminal
CN107889070A (en) * 2017-11-08 2018-04-06 广东欧珀移动通信有限公司 Image processing method, device, terminal and computer-readable recording medium
CN109815679A (en) * 2018-12-26 2019-05-28 维沃移动通信有限公司 Right management method and mobile terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007088754A (en) * 2005-09-21 2007-04-05 Olympus Imaging Corp Device and program for processing contents data
JP4942177B2 (en) * 2006-11-20 2012-05-30 キヤノン株式会社 Information processing apparatus, control method therefor, and program
JP4548529B2 (en) * 2008-08-18 2010-09-22 ソニー株式会社 Information recording apparatus, imaging apparatus, information recording method, and program
US20120249853A1 (en) * 2011-03-28 2012-10-04 Marc Krolczyk Digital camera for reviewing related images
CN111143586B (en) * 2019-08-09 2023-09-08 华为技术有限公司 Picture processing method and related device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011022641A (en) * 2009-07-13 2011-02-03 Nippon Telegr & Teleph Corp <Ntt> Privacy protection system and privacy protection method
US20150296170A1 (en) * 2014-04-11 2015-10-15 International Business Machines Corporation System and method for fine-grained control of privacy from image and video recording devices
CN104318177A (en) * 2014-10-29 2015-01-28 小米科技有限责任公司 Protection method and protection device for data of terminal equipment
CN105530261A (en) * 2015-12-23 2016-04-27 北京奇虎科技有限公司 Privacy information protecting method and device
CN109688145A (en) * 2015-12-23 2019-04-26 北京奇虎科技有限公司 The guard method of privacy information and device
CN106778335A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Method for secret protection and device, mobile terminal that a kind of application is installed
CN107025410A (en) * 2017-03-17 2017-08-08 北京珠穆朗玛移动通信有限公司 Image display method and electronic installation
CN107133498A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy application management method and device and mobile terminal
CN107889070A (en) * 2017-11-08 2018-04-06 广东欧珀移动通信有限公司 Image processing method, device, terminal and computer-readable recording medium
CN109815679A (en) * 2018-12-26 2019-05-28 维沃移动通信有限公司 Right management method and mobile terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021027633A1 (en) * 2019-08-09 2021-02-18 华为技术有限公司 Picture processing method and related apparatus
CN112163200A (en) * 2020-09-27 2021-01-01 维沃移动通信(杭州)有限公司 Picture processing method and device and electronic equipment
CN114547631A (en) * 2020-11-18 2022-05-27 成都鼎桥通信技术有限公司 Terminal control method and device and terminal
CN114547631B (en) * 2020-11-18 2023-03-28 成都鼎桥通信技术有限公司 Terminal control method and device and terminal
CN112887590A (en) * 2021-01-11 2021-06-01 北京小米移动软件有限公司 Image processing method, device and storage medium
CN112887799B (en) * 2021-03-11 2023-07-25 北京小米移动软件有限公司 Image resource sharing method, device and medium
CN112887799A (en) * 2021-03-11 2021-06-01 北京小米移动软件有限公司 Image resource sharing method, device and medium
CN114288500A (en) * 2021-12-02 2022-04-08 中国科学院深圳先进技术研究院 Man-machine ventilation asynchronous detection model and device based on fuzzy entropy feature extraction
CN114288500B (en) * 2021-12-02 2024-03-19 中国科学院深圳先进技术研究院 Man-machine ventilation asynchronous detection model and device based on fuzzy entropy feature extraction
CN116095226A (en) * 2022-08-03 2023-05-09 荣耀终端有限公司 Photo processing method and electronic equipment
CN116095226B (en) * 2022-08-03 2023-11-21 荣耀终端有限公司 Photo processing method, electronic device, and readable storage medium
CN115374482A (en) * 2022-10-24 2022-11-22 荣耀终端有限公司 Image processing method and electronic device
CN115374482B (en) * 2022-10-24 2023-09-22 荣耀终端有限公司 Image processing method and electronic equipment

Also Published As

Publication number Publication date
CN111143586B (en) 2023-09-08
WO2021027633A1 (en) 2021-02-18

Similar Documents

Publication Publication Date Title
CN111143586B (en) Picture processing method and related device
WO2020253719A1 (en) Screen recording method and electronic device
CN113542839B (en) Screen projection method of electronic equipment and electronic equipment
US20230070358A1 (en) File Sharing Method, System, and Related Device
CN114173000B (en) Method, electronic equipment and system for replying message and storage medium
CN110198362B (en) Method and system for adding intelligent household equipment into contact
CN114173204A (en) Message prompting method, electronic equipment and system
CN113609498A (en) Data protection method and electronic equipment
WO2021052204A1 (en) Address book-based device discovery method, audio and video communication method, and electronic device
WO2023015963A1 (en) File management method, electronic device, and computer-readable storage medium
CN111615820B (en) Method and equipment for performing domain name resolution by sending key value to GRS server
CN113536374A (en) Image privacy protection method and electronic equipment
CN114553814A (en) Method and device for processing push message
CN114157756A (en) Task processing method and related electronic equipment
CN111316619B (en) Photo sharing method and electronic equipment
CN112532508B (en) Video communication method and video communication device
CN114064160A (en) Application icon layout method and related device
CN111886849B (en) Information transmission method and electronic equipment
EP4293997A1 (en) Display method, electronic device, and system
CN113590346B (en) Method and electronic equipment for processing service request
CN110191223B (en) Method for adding mail contact and electronic equipment
CN114117367A (en) Data protection method and electronic equipment
CN114254334A (en) Data processing method, device, equipment and storage medium
EP4206924A1 (en) File sharing method and electronic device
CN115460445A (en) Screen projection method of electronic equipment and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant